Which aspect of the CIA triad is violated by an unauthorized database rollback or undo?
A. Availability
B. Identification
C. Integrity
D. Confidentiality
Answer: C. Integrity
You might also like to view...
The _______ needs to be named in order for the input tags to be associated with the correct form.
Fill in the blank(s) with the appropriate word(s).
The primary difference between sequential "if" statements and nested "if" statements is:
a. sequential "if" is for more complex decision making. b. nested "if" is for more complex decision making. c. there is no real difference between the two. d. in a sequential "if", the second decision is always made regardless of the answer to the first. e. None of the above.
Which of the following is false?
a. Method finalize does not take parameters and has return type void. b. Memory leaks using Java are rare because of automatic garbage collection. c. Objects are marked for garbage collection by method finalize. d. The garbage collector reclaims unused memory.
Passwords are case-sensitive, and they may consist of letters, numbers, and ________
Fill in the blank(s) with correct word